Muutke küpsiste eelistusi

Risk Assessment for Water Infrastructure Safety and Security [Kõva köide]

  • Formaat: Hardback, 432 pages, kõrgus x laius x paksus: 234x156x18 mm
  • Ilmumisaeg: 24-Aug-2011
  • Kirjastus: IWA Publishing
  • ISBN-10: 1780400217
  • ISBN-13: 9781780400211
  • Kõva köide
  • Hind: 146,35 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Hardback, 432 pages, kõrgus x laius x paksus: 234x156x18 mm
  • Ilmumisaeg: 24-Aug-2011
  • Kirjastus: IWA Publishing
  • ISBN-10: 1780400217
  • ISBN-13: 9781780400211
  • Examines all aspects of water safety and security
  • Evaluates the potential terrorist threat to the water supply system
  • Presents qualitative and quantitative processes and models for security and safe operation of facilities and critical infrastructure
  • Explores recent incidences of levels of drugs in the water supply
  • Offers various risk and vulnerability methodologies for assessing critical infrastructure security
One of the seventeen critical infrastructures vital to the security of the United States, the water supply system remains largely unprotected from the threat of terrorism, including possible revenge by Al Qaeda over the killing of Osama Bin Laden. Recognizing and identifying prospective events of terrorism against the water infrastructure is critical to the protection of the nation, as the consequences triggered by a terrorist attack on the water supply would be devastating. Risk Assessment for Water Infrastructure: Safety and Security provides a unique quantitative risk assessment methodology for protection and security against terrorist contamination, vandalism, attacks against dams, and other threats to water supply systems.

Focusing on the human safety, environmental, and economic consequences triggered by potential terrorist attacks and other threats, the book presents:
  • The development of an integrated approach of risk assessment based upon the cumulative prospect theory
  • The qualitative/quantitative processes and models for security and safe facility operations as required by EPA, DHS, and other governmental and regulatory agencies
  • The application of an integrated model to the risk assessment of surface water, dams, wells, wastewater treatment facilities, reservoirs, and aqueducts of large urban regions
  • The development of intelligence analysis incorporating risk assessment for terrorism prevention
Finally, Risk Assessment for Water Infrastructure: Safety and Security presents the legal and regulatory requirements and policy related to the protection and security of water infrastructure from terrorism and natural hazards to both human health and the environment. By analyzing potential terrorist risks against the water supply, strategic improvements in U.S. water infrastructure security may be achieved, including changes in policy, incorporation of intrusion detection technology, increased surveillance, and increased intelligence. More information about the book can be found on the Water Wiki in an article written by the author.

More information about the book can be found in this article written by the author for the WaterWiki: http://www.iwawaterwiki.org/xwiki/bin/view/Articles/Articlename_0

Author: Anna M. Doro-on is an engineer with over 12 years professional experience in design, construction, and utility infrastructure projects. She specializes in the development and application of innovative environmental remediation technologies; civil, environmental, and water resources engineering; water and wastewater infrastructure design and rehabilitation; risk assessment and management for critical infrastructure with focus on terrorism, weapons of mass destruction, and public health protection; reduction of contamination to water resources and the environment; quantitative risk assessment for catastrophic event prevention; technology development; and project inspections and monitoring. She holds M.S. and Ph.D. degrees in Civil Engineering and Environmental Science & Engineering respectively, both from The University of Texas at San Antonio.

Risk Assessment for Water Infrastructure Safety and Security is co-published with CRC Press
List of Figures
xvii
List of Tables
xxiii
Preface xxix
Acknowledgments xxxi
About the Author xxxiii
1 Introduction
1(4)
1.1 Objective
2(1)
1.2 Scope
2(1)
1.3 Purpose
3(2)
2 Acts of Terrorism and the Biological, Chemical, and Radiological Weapons Used against Water Infrastructure
5(70)
2.1 Introduction
5(1)
2.2 Characterization of Terrorism
6(5)
2.2.1 High-Profile Terrorism against the United States
6(1)
2.2.2 Existing Regulations against Terrorism in the United States
6(1)
2.2.2.1 Critical Infrastructure Information Act
6(1)
2.2.2.2 Freedom of Information Act
7(1)
2.2.2.3 Chemical Facility Antiterrorism Standards: Interim Final Rule
7(1)
2.2.2.4 USA Patriot Act
7(1)
2.2.3 International Laws and Agencies against Terrorism
8(1)
2.2.4 Water Infrastructure Terrorism Attempts and Disasters in the United States
8(3)
2.3 Chemical Terrorism Acts
11(12)
2.3.1 Characterization of Chemical Threats
11(1)
2.3.1.1 Chemical Threats
11(3)
2.3.1.2 Potential Chemical Threats
14(1)
2.3.1.3 Cyanide
14(1)
2.3.1.4 Mustard Agents
15(1)
2.3.1.5 Nerve Agents
15(1)
2.3.1.6 Toxic Industrial Agents
15(1)
2.3.1.7 Arsenic
15(1)
2.3.1.8 Pesticides and Herbicides
16(1)
2.3.1.9 Gasoline Additive: Methyl Tert-Butyl Ether
16(1)
2.3.1.10 Gasoline Additive: Ethanol
17(1)
2.3.1.11 Inorganic Contaminants
17(2)
2.3.1.12 Organic Contaminants
19(4)
2.4 Potential Hazards of Chemical Threats
23(19)
2.4.1 Chemicals' LD50
23(1)
2.4.1.1 Cyanide's LD50
23(1)
2.4.1.2 Arsenic's LD50
23(1)
2.4.1.3 Pesticides and Herbicides' LD50
24(1)
2.4.1.4 Gasoline Additive: MTBE's LD50
24(1)
2.4.1.5 Gasoline Additive: Ethanol's LD50
24(1)
2.4.1.6 Inorganic and Organic Contaminants' LD50
25(5)
2.4.2 Characterization of Potential Hazards
30(1)
2.4.2.1 Cyanide
30(1)
2.4.2.2 Arsenic
30(1)
2.4.2.3 Pesticides
31(1)
2.4.2.4 Gasoline Additive: MTBE
31(1)
2.4.2.5 Gasoline Additive: Ethanol
31(1)
2.4.2.6 Inorganic and Organic Contaminants
31(9)
2.4.3 Chlorine Oxidation of Chemical Threats in the Water Supply Treatment System
40(1)
2.4.3.1 Cyanide
40(1)
2.4.3.2 Arsenic
40(1)
2.4.3.3 Pesticides
41(1)
2.4.4.4 Gasoline Additive: MTBE
42(1)
2.5 Potential Reduction Approach for Chemical Threats
42(11)
2.5.1 Arsenic Remediation
42(1)
2.5.1.1 Coagulation/Filtration
43(1)
2.5.1.2 Iron/Manganese Oxidation
43(1)
2.5.1.3 Enhanced Coagulation
43(1)
2.5.1.4 Lime Softening
44(1)
2.5.1.5 Activated Alumina
44(1)
2.5.1.6 Ion Exchange
44(1)
2.5.1.7 Membrane Processes
44(1)
2.5.2 Cyanide Remediation
44(1)
2.5.2.1 Ion Exchange
45(1)
2.5.2.2 Reverse Osmosis
45(1)
2.5.2.3 Hypochlorite
45(1)
2.5.2.4 Pesticides Remediation
46(1)
2.5.2.5 Powdered Activated Carbon Filtration and Granular Activated Carbon Filtration
47(1)
2.5.2.6 Reverse Osmosis
47(1)
2.5.2.7 Methyl Tert-Butyl Ether Remediation
48(1)
2.5.2.8 Air Stripping Treatment: Advantages and Disadvantages
49(1)
2.5.2.9 Activated Carbon Treatment: Advantages and Disadvantages
49(1)
2.5.2.10 Other Possible Treatments for MTBE
49(1)
2.5.3 Groundwater and Surface Water Remediation
50(1)
2.5.3.1 Pump-and-Treat
50(1)
2.5.3.2 Hydraulic Containment
50(1)
2.5.3.3 Air Sparging with Soil Vapor Extraction
51(1)
2.5.3.4 In situ Oxidation
51(1)
2.5.3.5 Permeable Reactive Barriers
51(1)
2.5.3.6 Phytoremediation
51(1)
2.5.3.7 Natural Attenuation
52(1)
2.5.3.8 Intrinsic and Enhanced Bioremediation
52(1)
2.5.3.9 Vapor Condensation-Cryogenic Technology
52(1)
2.6 Biological Threats
53(6)
2.7 Radiological Threats
59(3)
2.8 Prescription Drugs (Pharmaceuticals), Personal Care Products, and Endocrine Disrupting Compounds in the Water System
62(3)
2.8.1 Prescription Drugs
62(1)
2.8.2 Personal Care Products
63(1)
2.8.3 Endocrine Disrupting Compounds
63(1)
2.8.4 Potential Reduction of Prescription Drugs (Pharmaceuticals), Personal Care Products, and Endocrine Disrupting Compounds
64(1)
2.8.4.1 Granular Activated Carbon
64(1)
2.8.4.2 Membranes
64(1)
2.8.4.3 Iron-Tetra Amidomacrocyclic Ligand
64(1)
2.8.4.4 Chlorine Oxidation
65(1)
2.8.4.5 Ozonation
65(1)
2.9 Illustrative Example for Quantifying the Chemical Threats to Yield Mass Casualties and Acute Injuries
65(10)
2.9.1 Example of Water Contamination
66(2)
References
68(7)
3 Explosives Used Against Water Infrastructure
75(34)
3.1 Introduction
75(1)
3.2 Characterization of Explosive Materials
75(22)
3.2.1 Acetone Peroxide
76(1)
3.2.2 Ammonium Nitrate
76(2)
3.2.3 Ammonium Nitrate-Fuel Oil
78(1)
3.2.4 Cyclonite (RDX)
78(2)
3.2.5 Dingu and Sorguyl
80(1)
3.2.6 Hexamethylenetetramine Dinitrate
80(1)
3.2.7 Hexanitroazobenzene
81(1)
3.2.8 Hexanitrodiphenylamine
81(1)
3.2.9 Hexanitrohexaazaisowurtzitane
81(3)
3.2.10 Lead Azide
84(1)
3.2.11 Lead Styphnate
85(2)
3.2.12 Mercury(II) Fulminate
87(1)
3.2.13 Nitrocellulose
87(2)
3.2.14 Nitroglycerin
89(1)
3.2.15 Octagen (HMX)
89(2)
3.2.16 Pentaerythritol Tetranitrate
91(2)
3.2.17 Picric Acid
93(3)
3.2.18 Plastic Explosives
96(1)
3.2.19 2,4,6-Trinitrotoluene
96(1)
3.3 Components and Applications of Explosive Materials
97(8)
3.3.1 Alginates
97(1)
3.3.2 Aluminum Powder
98(1)
3.3.3 Base Charge
98(1)
3.3.4 Blasting Caps
98(1)
3.3.5 Blasting Galvanometer
98(1)
3.3.6 Blasting Machine
98(1)
3.3.7 Blast Meters and Boosters
98(1)
3.3.8 Bridgewire Detonator
99(1)
3.3.9 Brisance
99(1)
3.3.10 Deflagration
99(1)
3.3.11 Delay Time and Element
99(1)
3.3.12 Detonation
100(1)
3.3.12.1 Shock Wave
100(1)
3.3.12.2 Detonation Wave Theory
101(1)
3.3.12.3 Selective Detonation
102(1)
3.3.12.4 Sympathetic Detonation
103(1)
3.3.12.5 Detonation Development Distance
103(1)
3.3.13 Electro-Explosive Device
103(1)
3.3.14 Oxidizer and Oxygen Balance of Explosives
103(1)
3.3.15 Heat of Explosion
104(1)
3.3.16 Underwater Detonation
104(1)
3.3.16.1 Shock Wave of Underwater Detonation
104(1)
3.3.16.2 Gas Bubble
105(1)
3.3.17 Quantification of the Amount of Explosives
105(1)
3.4 Hazards of Explosives
105(1)
3.5 The Challenge of Improvised Explosive Devices in the United States
106(3)
References
106(3)
4 Water Infrastructure
109(26)
4.1 Introduction
109(1)
4.2 Acts of Terrorism against Water Infrastructure
109(1)
4.3 Groundwater Resources
110(3)
4.3.1 Limestone Aquifers
111(1)
4.3.2 Karst Aquifers
111(1)
4.3.3 Aquifer Storage and Recovery Technology
111(1)
4.3.4 Sandstone Aquifer
111(2)
4.3.5 Terrorism against Groundwater Resources
113(1)
4.4 Desalination Treatment Facilities
113(5)
4.5 Water Tanks
118(1)
4.6 Reservoirs
118(5)
4.6.1 Exclusive Capacity
118(1)
4.6.2 Multiple-Purpose Capacity
118(5)
4.6.3 Inactive Space
123(1)
4.6.4 Terrorism against Reservoirs
123(1)
4.7 Dams
123(1)
4.7.1 Terrorism against Dams
124(1)
4.8 Aqueducts
124(4)
4.8.1 Terrorism against Aqueducts
124(4)
4.9 Surface Water
128(1)
4.10 Municipal Water Treatment Plants
128(3)
4.10.1 Terrorism against Municipal Water Treatment Plants
128(3)
4.11 Municipal Wastewater Treatment Plants
131(2)
4.11.1 Terrorism against Municipal Wastewater Treatment Plants
131(2)
4.11.2 Major Sewer Pipelines and Manholes
133(1)
4.12 Impacts
133(2)
References
133(2)
5 Regulatory Policies for the Protection of Water Infrastructure
135(16)
5.1 U.S. Regulatory Policies for Groundwater and Water Supply System Protection
136(8)
5.1.1 Safe Drinking Water Act
136(1)
5.1.1.1 Title 40 of the Code of Federal Regulations
136(2)
5.1.2 Bioterrorism Act: Title IV-Drinking Water Security and Safety
138(6)
5.2 Funding for Protection Research
144(1)
5.3 Enforcement of Regulations
145(1)
5.4 Agencies Involved in Protection Policies
146(1)
5.5 Federal Regulations for Dams, Reservoirs, and Other Water Systems
146(1)
5.5.1 Water Resources Development Act
146(1)
5.5.2 Dam Safety and Security Act
146(1)
5.5.3 River and Harbors Act of 1899
146(1)
5.5.4 The Federal Water Power Act of 1920
147(1)
5.6 Funding for Protection Research Related to Dams, Reservoirs, and Other Water Systems
147(1)
5.7 Agencies and Programs Involved in the Protection Policies for Dams, Reservoirs, and Other Water Systems
147(4)
5.7.1 The National Dam Safety Review Board
148(1)
5.7.2 The Interagency Committee on Dam Safety
148(1)
5.7.3 The Association of State Dam Safety Officials
148(1)
5.7.4 The United States Society on Dams
148(1)
References
148(3)
6 Introduction to Risk and Vulnerability Assessment
151(24)
6.1 Introduction
151(1)
6.2 Standard Risk and Vulnerability Strategies and Models
151(17)
6.2.1 Basic Homeland Security Risk Assessments
151(1)
6.2.2 Model-Based Vulnerability Analysis
152(1)
6.2.3 Water/Wastewater Vulnerability Self-Assessment Tools
152(1)
6.2.4 Security Vulnerability Self-Assessment Guide for Small Drinking Water Systems
152(1)
6.2.5 Automated Security Survey and Evaluation Tool
153(1)
6.2.6 Risk Analysis and Management for Critical Asset Protection Plus
153(1)
6.2.7 CARVER Matrix
154(1)
6.2.7.1 Criticality
154(1)
6.2.7.2 Accessibility
155(1)
6.2.7.3 Recuperability
156(1)
6.2.7.4 Vulnerability
156(1)
6.2.7.5 Effect
156(1)
6.2.7.6 Recognizability
157(1)
6.2.8 CARVER Plus Shock
158(1)
6.2.9 Freight Assessment System
159(1)
6.2.10 Federal Emergency Management Agency HAZUS-MH
160(1)
6.2.11 Chemical Security Assessment Tool
160(1)
6.2.11.1 Chemical Weapons/Chemical Weapon Precursors
161(1)
6.2.11.2 Chemicals That Qualify as a Weapon of Mass Effect
161(1)
6.2.11.3 Chemicals That Qualify as an Improvised Explosive Device
161(1)
6.2.11.4 Sabotage or Contamination of Chemicals
161(1)
6.2.11.5 Mission-Critical Chemicals
161(1)
6.2.12 Automated Targeting System
161(1)
6.2.12.1 ATS-Inbound
162(1)
6.2.12.2 ATS-Outbound
162(1)
6.2.12.3 ATS-Passenger
162(1)
6.2.12.4 ATS-Land
162(1)
6.2.12.5 ATS-International
162(1)
6.2.12.6 ATS-Trend Analysis and Analytical Selectivity
162(1)
6.2.13 Risk Lexicon
163(1)
6.2.14 Microbial Risk Assessment Framework
163(1)
6.2.14.1 Chemical Risk Assessment
163(1)
6.2.14.2 Ecological Risk Assessment
164(1)
6.2.14.3 MRA for Drinking Water
164(1)
6.2.14.4 MRA for Wastewater
164(1)
6.2.14.5 A Need to Improve MRA
165(1)
6.2.15 Pareto Principle (80-20 Rule)
165(1)
6.2.16 Sandia National Laboratories Security Risk Assessment Methods
165(1)
6.2.17 Security Vulnerability Assessment Method
166(1)
6.2.18 ASME RA-S Probabilistic Risk Assessment
166(1)
6.2.19 Checkup Program for Small Systems
167(1)
6.2.20 Water Health and Economic Analysis Tool
167(1)
6.2.21 Water Contaminant Information Tool
167(1)
6.3 Historical Perspective of Prospect Theory
168(1)
6.3.1 Expected Utility Theory
168(1)
6.3.2 Classical Prospect Theory
169(1)
6.4 Cumulative Prospect Theory
169(1)
6.4.1 Framing Effects
169(1)
6.4.2 Nonlinear Preferences
169(1)
6.4.3 Source Dependence
169(1)
6.4.4 Risk Seeking
170(1)
6.4.5 Loss Aversion
170(1)
6.5 Advances in Prospect Theory
170(2)
6.6 A Need for Risk Acceptability Analysis
172(3)
References
172(3)
7 Standard Risk and Vulnerability Assessment
175(26)
7.1 Introduction
175(1)
7.2 Standard Homeland Security Risk Assessment and RAMCAP Plus Processes
175(14)
7.2.1 Fatalities and Serious Injuries
177(1)
7.2.2 Financial and Economic Impacts
177(7)
7.2.3 Vulnerability Analysis
184(1)
7.2.4 Threat Assessment
185(1)
7.2.5 Risk and Resilience Assessment
185(4)
7.2.6 Risk and Resilience Management
189(1)
7.3 CARVER Matrix
189(1)
7.4 CARVER + Shock
189(1)
7.5 Model-Based Vulnerability Analysis
189(4)
7.6 Vulnerability Self-Assessment Tool
193(1)
7.7 Security Vulnerability Self-Assessment Guide for Small Drinking Water Systems
194(1)
7.8 Automated Security Survey and Evaluation Tool (ASSET)
195(1)
7.9 Security Vulnerability Assessment
195(3)
7.10 Requirement of Incremental Risk Acceptability Analysis
198(3)
References
198(3)
8 Quantitative Risk Estimation Model
201(18)
8.1 Elements of Risk Assessment
202(5)
8.1.1 Risk Estimation Process for Terrorist Attacks against Water Infrastructure
202(5)
8.2 Risk Estimated by Event Tree Analysis
207(2)
8.3 Estimation of Risk and Risk Factors
209(6)
8.3.1 Calculation of Risk Rate
209(5)
8.3.2 Life Expectancy Models
214(1)
8.4 Fault Tree Analysis
215(4)
8.4.1 Probability Estimation Based on Probability Model in Figure 8.4
216(2)
References
218(1)
9 Cumulative Prospect Theory and Risk Acceptability
219(86)
9.1 Introduction
219(2)
9.1.1 Cumulative Prospect Theory of Kahneman and Tversky
220(1)
9.2 Public Perception of Risk
221(3)
9.2.1 Advanced Theory and Risk
221(2)
9.2.1.1 Voluntary or Involuntary
223(1)
9.2.1.2 Discounting Time
223(1)
9.2.1.3 Identifiability of Taking a Statistical Risk
223(1)
9.2.1.4 Controllability
223(1)
9.2.1.5 Position in Hierarchy of Consequence
223(1)
9.2.1.6 Ordinary or Catastrophic
223(1)
9.2.1.7 Natural- or Man-Originated
224(1)
9.2.1.8 Magnitude of Probability of Occurrence
224(1)
9.3 Strategic Determination of Risk Acceptability
224(1)
9.4 Quantitative Revealed Societal Preference Method
225(10)
9.4.1 Behavior and Risk Attitude
225(3)
9.4.2 Establishing Risk Comparison Factors
228(1)
9.4.3 Controllability of Risk
228(1)
9.4.4 Perceived Degree of Control
229(1)
9.4.5 System Control in Risk Reduction
229(1)
9.4.5.1 Systemic Control of Risk
229(2)
9.4.5.2 Control Factors
231(1)
9.4.6 Controllability of New Technological Systems
231(1)
9.4.7 Cost-Benefit Analysis
231(1)
9.4.8 Prerequisites for Risk Acceptance of Terrorist Attacks against Groundwater and the Water Supply System
232(1)
9.4.8.1 Need for a Methodology
233(2)
9.5 Establishing the Risk Referent
235(68)
9.5.1 Multiple Risk Referents
235(1)
9.5.2 Risk Proportionality Factor Derivation From Risk References
236(1)
9.5.3 Risk Proportionality Derating Factors
236(2)
9.5.4 Degree of Systemic Control
238(1)
9.5.5 Conversion of a Risk Reference to a Risk Referent
238(2)
9.5.6 Risk Estimation and Risk Acceptability for Water Infrastructure
240(63)
9.6 Implications
303(2)
References
303(2)
10 Emergency Preparedness, Response, and Preventive Measures
305(34)
10.1 Introduction
305(12)
10.2 National Response Framework
317(4)
10.2.1 Local Governments
317(1)
10.2.1.1 Roles of Chief Elected or Appointed Officials
317(1)
10.2.1.2 Roles of Emergency Managers
317(1)
10.2.1.3 Roles of Department and Agency Heads
317(1)
10.2.1.4 Roles of Individuals and Households
318(1)
10.2.2 States, Territories, and Tribal Governments
318(1)
10.2.2.1 Roles of the Governor
318(1)
10.2.2.2 Roles of the State Homeland Security Advisor
319(1)
10.2.2.3 Roles of the Director of the State Emergency Management Agency
319(1)
10.2.2.4 Roles of Other State Departments and Agencies
319(1)
10.2.2.5 Roles of Indian Tribes
319(1)
10.2.2.6 Roles of Tribal Leaders
319(1)
10.2.3 Federal Government
320(1)
10.2.3.1 Role of the Secretary of Homeland Security
320(1)
10.2.3.2 Law Enforcement
320(1)
10.2.3.3 National Defense and Defense Support of Civil Authorities
320(1)
10.2.3.4 International Coordination
320(1)
10.2.3.5 Intelligence
321(1)
10.2.4 Private Sector and Nongovernmental Organizations
321(1)
10.2.4.1 Roles of Private Sector
321(1)
10.2.4.2 Roles of Nongovernmental Organizations
321(1)
10.2.4.3 Roles of Volunteers and Donors
321(1)
10.3 Emergency Preparedness
321(2)
10.3.1 Planning
322(1)
10.3.2 Organization
322(1)
10.3.3 Equipment
322(1)
10.3.4 Training
322(1)
10.3.5 Exercises, Evaluation, and Improvement
323(1)
10.4 Response
323(1)
10.4.1 Baseline Priorities
323(1)
10.4.2 Local, Tribal, and State Actions
323(1)
10.4.3 Federal Actions
324(1)
10.4.4 Alerts
324(1)
10.4.5 Operations Center
324(1)
10.5 Activate and Deploy Resources
324(1)
10.6 Proactive Response to Catastrophic Incidents
325(1)
10.7 Recovery
325(1)
10.8 Preventive Measures
325(14)
References
337(2)
11 Strategic Intelligence Analysis for Water Infrastructure Terrorism Prevention
339(51)
11.1 Introduction
339(1)
11.2 Intelligence Analysis
340(1)
11.3 Traditional Intelligence Cycle
340(6)
11.4 Quantitative Risk Estimation Model to Aid Intelligence Analysis
346(14)
11.4.1 Process of Risk Estimation for Water Infrastructure Threats for Intelligence Analysis
346(14)
11.5 Event Tree Analysis Model
360(1)
11.6 Perspectives of Risk Acceptability in Strategic Intelligence Analysis
360(17)
11.6.1 Risk Estimation and Risk Acceptability
377(1)
11.7 Implications
377(13)
References 390(1)
Index 391
Anna M. Doro-on is an engineer with over 12 years professional experience in design, construction, and utility infrastructure projects. She specializes in the development and application of innovative environmental remediation technologies; civil, environmental, and water resources engineering; water and wastewater infrastructure design and rehabilitation; risk assessment and management for critical infrastructure with focus on terrorism, weapons of mass destruction, and public health protection; reduction of contamination to water resources and the environment; quantitative risk assessment for catastrophic event prevention; technology development; and project inspections and monitoring. She holds M.S. and Ph.D. degrees in Civil Engineering and Environmental Science & Engineering respectively, both from The University of Texas at San Antonio.